Static task
static1
Behavioral task
behavioral1
Sample
831d547b9876950a2b50d8cb6d10cbe6596a2359f0a299ab976d44050a406b77.exe
Resource
win7-20240319-en
General
-
Target
831d547b9876950a2b50d8cb6d10cbe6596a2359f0a299ab976d44050a406b77
-
Size
2.3MB
-
MD5
a6d04718c9e5bb6fe9677342c997e3af
-
SHA1
1ae126571ebdb444ff6000fd7e27b2e47242326f
-
SHA256
831d547b9876950a2b50d8cb6d10cbe6596a2359f0a299ab976d44050a406b77
-
SHA512
0511acbd71994dfb1caaf775168318c145b330f68afc870897ce46d339d12ee2b3dcb53b4099b15062e880fcb4970a8072717fa321d2be6a3e859d107e90689b
-
SSDEEP
49152:W2ggggMC3VNaJqb6f+lBijGw8zZN7KP/h6vb31/XE7B:WEVNaJqdijU/ghY1o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 831d547b9876950a2b50d8cb6d10cbe6596a2359f0a299ab976d44050a406b77
Files
-
831d547b9876950a2b50d8cb6d10cbe6596a2359f0a299ab976d44050a406b77.exe windows:5 windows x86 arch:x86
129fcea10d9f405045b1c9158fe67f29
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
FormatMessageW
WideCharToMultiByte
ReleaseMutex
WaitForSingleObject
CloseHandle
CreateMutexW
GetCommandLineW
LockResource
LoadResource
SizeofResource
FindResourceW
Sleep
MultiByteToWideChar
VerSetConditionMask
FindClose
GetSystemTime
GetNativeSystemInfo
GetSystemDirectoryW
FindFirstFileW
FindNextFileW
MoveFileExW
VerifyVersionInfoW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
WaitForMultipleObjects
DeleteFileW
FreeLibrary
LocalFree
LoadLibraryW
GetVersionExW
GetLogicalDriveStringsW
GetEnvironmentVariableW
GetDriveTypeW
CreateDirectoryW
GetCurrentProcess
GetFileSize
WriteFile
ReadFile
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreateFileA
CreateFileW
MoveFileW
VirtualQuery
InitializeCriticalSection
TlsAlloc
GetSystemDirectoryA
LocalAlloc
OpenProcess
FindResourceExW
SetEvent
TerminateProcess
VirtualAlloc
VirtualFree
VirtualProtect
LoadLibraryA
TlsFree
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
EncodePointer
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlUnwind
GetTimeZoneInformation
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
ExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
GetACP
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStringTypeW
ReadConsoleW
GetFileAttributesExW
SetStdHandle
SetEndOfFile
FlushFileBuffers
WriteConsoleW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
SwitchToThread
CreateEventW
SetLastError
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentThreadId
TryEnterCriticalSection
TlsSetValue
ReadConsoleA
SetConsoleMode
SwitchToFiber
DeleteFiber
CreateFiber
GlobalMemoryStatus
ConvertFiberToThread
ConvertThreadToFiber
SystemTimeToFileTime
IsBadReadPtr
TlsGetValue
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringW
IsDebuggerPresent
GetModuleFileNameW
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
DeviceIoControl
DecodePointer
GetFullPathNameW
GetCurrentDirectoryW
PeekNamedPipe
GetEnvironmentVariableA
CompareFileTime
SleepEx
user32
DefWindowProcW
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
advapi32
CryptCreateHash
RegCreateKeyExW
LookupAccountSidW
GetTokenInformation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
FreeSid
AllocateAndInitializeSid
RegQueryValueExW
OpenProcessToken
RegOpenKeyExW
RegSetValueExW
CryptGenRandom
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
RegCloseKey
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
ReportEventW
GetUserNameW
RegisterEventSourceW
DeregisterEventSource
SetEntriesInAclW
ole32
CoUninitialize
CoInitialize
shlwapi
PathRemoveFileSpecW
PathFindFileNameW
PathFileExistsW
PathCombineW
SHDeleteKeyW
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
psapi
GetProcessImageFileNameW
EnumProcesses
urlmon
ObtainUserAgentString
shell32
SHGetFolderPathW
CommandLineToArgvW
crypt32
CertFindCertificateInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CertFreeCertificateContext
CertCloseStore
CertOpenStore
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertOpenSystemStoreW
CertEnumCertificatesInStore
ws2_32
sendto
recvfrom
WSAEventSelect
WSAEnumNetworkEvents
gethostname
send
freeaddrinfo
getaddrinfo
select
WSACreateEvent
__WSAFDIsSet
ioctlsocket
recv
listen
htonl
accept
closesocket
WSACleanup
WSAStartup
WSAIoctl
WSASetLastError
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
WSAGetLastError
getnameinfo
WSACloseEvent
shutdown
wldap32
ord147
ord133
ord79
ord142
ord167
ord127
ord27
ord26
ord117
ord301
ord145
ord219
ord46
ord14
ord216
ord208
ord41
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 480KB - Virtual size: 480KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 142KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE